Deck 14: Business Continuity

Full screen (f)
exit full mode
Question
Which of the following is a location that provides office space,but the customer must provide and install all the equipment needed to continue operations?

A)cold site
B)hot site
C)spare site
D)warm site
Use Space or
up arrow
down arrow
to flip the card.
Question
An enterprise contingency plan is copying information to a different medium and storing it at an off-site location so that it can be used in the event of a disaster.
Question
Forensics is the application of science to questions that are of interest to the technology professions.
Question
When does a company need to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position,what should be performed?

A)business risk analysis
B)business alert assessment
C)business productivity analysis
D)business impact analysis
Question
What type of element addresses the recovery of critical information technology (IT)assets,including systems,applications,databases,storage and network assets?

A)enterprise recovery
B)disaster recovery
C)business recovery
D)crisis management
Question
Resumption planning is used for the recovery of critical business functions separate from IT,such as resuming a critical manufacturing process.
Question
The process of identifying exposure to threats,creating preventive and recovery procedures,and then testing them to determine if they are sufficient,is known as:

A)business continuity planning
B)disaster planning
C)business management planning
D)enterprise disaster planning
Question
An incident response plan is a set of written instructions for reacting to a security incident.
Question
A legal stop order is a notification sent from the legal team to employees instructing them not to delete electronically stored information or paper documents that may be relevant to the incident.
Question
Which term below describes a component or entity in a system which,if it no longer functions,will disable an entire system?

A)recovery site
B)recovery point
C)single point of failure
D)cascade point of failure
Question
Select below the type of cluster where standby server exists only to take over for another server in the event of its failure.

A)symmetric network
B)symmetric server
C)asymmetric network
D)asymmetric server
Question
How can an administrator keep devices powered when power is interrupted?

A)uninterruptible power supply
B)redundant power supply
C)uninterruptible system supply
D)replica power supply
Question
A service contract between a vendor and a client that specifies what services will be provided,the responsibilities of each party,and any guarantees of service,is known as:

A)service level agreement
B)recovery point objective
C)recovery time objective
D)service point agreement
Question
A location that has all the equipment installed but does not have active Internet or telecommunications facilities,and does not have current backups of data,is an example of a:

A)cold site
B)hot site
C)spare site
D)warm site
Question
A snapshot of the data is essentially a series of "reference markers" of the data at a specific point in time.
Question
A business continuity plan will help determine the mission-essential function or the activity that serves as the core purpose of the enterprise.
Question
A disaster recovery plan is developed for restoring the IT functions and services to their former state.
Question
In what type of cluster does every server perform useful work so that if one fails,the remaining servers take on the additional load?

A)symmetric network
B)asymmetric network
C)symmetric server
D)asymmetric server
Question
A business impact analysis may include succession planning or determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.
Question
A privacy impact assessment is used to identify and mitigate privacy risks.
Question
What kind of data can be lost when a computer is turned off?

A)volatile
B)static
C)non-volatile
D)persistent
Question
Which of the following is the sudden flow of electric current between two objects?

A)electromagnetic interference
B)Faraday interference
C)electrostatic discharge
D)electromagnetic pulse
Question
Using technology to search for computer evidence of a crime in order to retrieve information,even if it has been altered or erased,that can be used in pursuit of an attacker or criminal is an example of:

A)computer forensics
B)penetration testing
C)vulnerability testing
D)risk management
Question
What kind of slack is created from information stored on a hard drive,which can contain remnants of previously deleted files or data?

A)RAM slack
B)Edge slack
C)Drive file slack
D)Sector slack
Question
The goal of redundancy is to reduce what variable?

A)average time between failures
B)mean time to recovery
C)median time to recovery
D)median time between failures
Question
Which of the following is caused by a short-duration burst of energy by the source?

A)electromagnetic interference
B)Faraday interference
C)electrostatic discharge
D)electromagnetic pulse
Question
What RAID type is based on striping,uses multiple drives,and is not fault tolerant if one of the drives fails?

A)RAID 0
B)RAID 1
C)RAID 2
D)RAID 5
Question
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

A)system standard
B)system view
C)system image
D)system baseline
Question
Multiple sectors on a disk,when combined,are referred to as a:

A)cluster
B)track
C)slice
D)platter
Question
Which of the following is a system of hard drives based on redundancy and used for increased reliability and performance?

A)MTBF
B)RPO
C)RAID
D)ESD
Question
What term is used to describe a documentation of control over evidence,which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A)chain of value
B)chain of use
C)chain of property
D)chain of custody
Question
What type of planning do many enterprises participate in that addresses a future event or circumstance that might possibly occur but cannot be predicted with any certainty?

A)contingency system evaluation
B)IT disaster planning
C)IT contingency planning
D)disaster recovery scenario
Question
What specific way can disaster recovery plans be tested?

A)alternative processing
B)restoration simulation
C)tabletop exercises
D)alternative exercises
Question
Which of the following is usually addressed in a disaster recovery plan? (Choose all that apply. )

A)Purpose and Scope
B)Restoration Procedures
C)Recovery Team
D)Business Procedures
Question
What value refers to the average amount of time until a component fails,cannot be repaired,and must be replaced?

A)average time between failures
B)mean time to recovery
C)mean time between failures
D)median time between failures
Question
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

A)baseline
B)mirror image
C)logical image
D)thin image
Question
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

A)bollard cage
B)mantrap
C)Faraday cage
D)Newton cage
Question
What type of assessment can determine if a system contains PII,whether a privacy impact assessment is required,and if any other privacy requirements apply to the IT system?

A)privacy threshold
B)privacy impact
C)privacy availability
D)privacy identification
Question
When the remaining cluster space of a partially filled sector is padded with contents from RAM.What is the name for this type of scenario?

A)Disk slack
B)RAM slack
C)ROM slack
D)Edge slack
Question
What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

A)RAID 0
B)RAID 1
C)RAID 2
D)RAID 5
Question
Describe the purpose of a disaster recovery plan.
Question
What are the objectives of disaster exercises?
Question
What are the steps in damage control?
Question
Discuss the purpose and importance of the chain of custody.
Question
Why should redundant networks be implemented in many enterprise environments?
Question
What is a hot site?
Question
What is required upon completion of an evidence examination?
Question
What do Windows computers do if a file being saved is not long enough to fill up the last sector on the disk?
Question
Explain how to best secure volatile data.
Question
Explain how an on-line UPS works and why their advantages when compared to off-line UPS units.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Business Continuity
1
Which of the following is a location that provides office space,but the customer must provide and install all the equipment needed to continue operations?

A)cold site
B)hot site
C)spare site
D)warm site
A
2
An enterprise contingency plan is copying information to a different medium and storing it at an off-site location so that it can be used in the event of a disaster.
False
3
Forensics is the application of science to questions that are of interest to the technology professions.
False
4
When does a company need to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position,what should be performed?

A)business risk analysis
B)business alert assessment
C)business productivity analysis
D)business impact analysis
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What type of element addresses the recovery of critical information technology (IT)assets,including systems,applications,databases,storage and network assets?

A)enterprise recovery
B)disaster recovery
C)business recovery
D)crisis management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Resumption planning is used for the recovery of critical business functions separate from IT,such as resuming a critical manufacturing process.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The process of identifying exposure to threats,creating preventive and recovery procedures,and then testing them to determine if they are sufficient,is known as:

A)business continuity planning
B)disaster planning
C)business management planning
D)enterprise disaster planning
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
An incident response plan is a set of written instructions for reacting to a security incident.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A legal stop order is a notification sent from the legal team to employees instructing them not to delete electronically stored information or paper documents that may be relevant to the incident.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which term below describes a component or entity in a system which,if it no longer functions,will disable an entire system?

A)recovery site
B)recovery point
C)single point of failure
D)cascade point of failure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Select below the type of cluster where standby server exists only to take over for another server in the event of its failure.

A)symmetric network
B)symmetric server
C)asymmetric network
D)asymmetric server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
How can an administrator keep devices powered when power is interrupted?

A)uninterruptible power supply
B)redundant power supply
C)uninterruptible system supply
D)replica power supply
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A service contract between a vendor and a client that specifies what services will be provided,the responsibilities of each party,and any guarantees of service,is known as:

A)service level agreement
B)recovery point objective
C)recovery time objective
D)service point agreement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A location that has all the equipment installed but does not have active Internet or telecommunications facilities,and does not have current backups of data,is an example of a:

A)cold site
B)hot site
C)spare site
D)warm site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A snapshot of the data is essentially a series of "reference markers" of the data at a specific point in time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A business continuity plan will help determine the mission-essential function or the activity that serves as the core purpose of the enterprise.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A disaster recovery plan is developed for restoring the IT functions and services to their former state.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
In what type of cluster does every server perform useful work so that if one fails,the remaining servers take on the additional load?

A)symmetric network
B)asymmetric network
C)symmetric server
D)asymmetric server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A business impact analysis may include succession planning or determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A privacy impact assessment is used to identify and mitigate privacy risks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What kind of data can be lost when a computer is turned off?

A)volatile
B)static
C)non-volatile
D)persistent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is the sudden flow of electric current between two objects?

A)electromagnetic interference
B)Faraday interference
C)electrostatic discharge
D)electromagnetic pulse
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Using technology to search for computer evidence of a crime in order to retrieve information,even if it has been altered or erased,that can be used in pursuit of an attacker or criminal is an example of:

A)computer forensics
B)penetration testing
C)vulnerability testing
D)risk management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What kind of slack is created from information stored on a hard drive,which can contain remnants of previously deleted files or data?

A)RAM slack
B)Edge slack
C)Drive file slack
D)Sector slack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The goal of redundancy is to reduce what variable?

A)average time between failures
B)mean time to recovery
C)median time to recovery
D)median time between failures
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is caused by a short-duration burst of energy by the source?

A)electromagnetic interference
B)Faraday interference
C)electrostatic discharge
D)electromagnetic pulse
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What RAID type is based on striping,uses multiple drives,and is not fault tolerant if one of the drives fails?

A)RAID 0
B)RAID 1
C)RAID 2
D)RAID 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

A)system standard
B)system view
C)system image
D)system baseline
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Multiple sectors on a disk,when combined,are referred to as a:

A)cluster
B)track
C)slice
D)platter
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a system of hard drives based on redundancy and used for increased reliability and performance?

A)MTBF
B)RPO
C)RAID
D)ESD
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What term is used to describe a documentation of control over evidence,which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A)chain of value
B)chain of use
C)chain of property
D)chain of custody
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What type of planning do many enterprises participate in that addresses a future event or circumstance that might possibly occur but cannot be predicted with any certainty?

A)contingency system evaluation
B)IT disaster planning
C)IT contingency planning
D)disaster recovery scenario
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What specific way can disaster recovery plans be tested?

A)alternative processing
B)restoration simulation
C)tabletop exercises
D)alternative exercises
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is usually addressed in a disaster recovery plan? (Choose all that apply. )

A)Purpose and Scope
B)Restoration Procedures
C)Recovery Team
D)Business Procedures
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
What value refers to the average amount of time until a component fails,cannot be repaired,and must be replaced?

A)average time between failures
B)mean time to recovery
C)mean time between failures
D)median time between failures
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

A)baseline
B)mirror image
C)logical image
D)thin image
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

A)bollard cage
B)mantrap
C)Faraday cage
D)Newton cage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
What type of assessment can determine if a system contains PII,whether a privacy impact assessment is required,and if any other privacy requirements apply to the IT system?

A)privacy threshold
B)privacy impact
C)privacy availability
D)privacy identification
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When the remaining cluster space of a partially filled sector is padded with contents from RAM.What is the name for this type of scenario?

A)Disk slack
B)RAM slack
C)ROM slack
D)Edge slack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

A)RAID 0
B)RAID 1
C)RAID 2
D)RAID 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the purpose of a disaster recovery plan.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What are the objectives of disaster exercises?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the steps in damage control?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the purpose and importance of the chain of custody.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Why should redundant networks be implemented in many enterprise environments?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is a hot site?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is required upon completion of an evidence examination?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What do Windows computers do if a file being saved is not long enough to fill up the last sector on the disk?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain how to best secure volatile data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how an on-line UPS works and why their advantages when compared to off-line UPS units.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.